[go: up one dir, main page]

Follow
Mohan Anand P
Mohan Anand P
Other namesMohan Anand Putrevu, Putrevu MA, MA Putrevu
Verified email at cse.iitk.ac.in
Title
Cited by
Cited by
Year
From text to mitre techniques: Exploring the malicious use of large language models for generating cyber attack payloads
PV Charan, H Chunduri, PM Anand, SK Shukla
arXiv preprint arXiv:2305.15336, 2023
872023
Advance persistent threat detection using long short term memory (LSTM) neural networks
PV Sai Charan, T Gireesh Kumar, P Mohan Anand
International Conference on Emerging Technologies in Computer Engineering, 45-54, 2019
342019
An ensemble approach for algorithmically generated domain name detection using statistical and lexical analysis
PM Anand, TG Kumar, PVS Charan
Procedia Computer Science 171, 1129-1136, 2020
312020
Hiper-early detection of a ransomware attack using hardware performance counters
PM Anand, PVS Charan, SK Shukla
Digital Threats: Research and Practice 4 (3), 1-24, 2023
292023
A comprehensive API call analysis for detecting Windows-based ransomware
PM Anand, PVS Charan, SK Shukla
2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022
282022
Early detection of ransomware activity based on hardware performance counters
MA Putrevu, VSC Putrevu, SK Shukla
Proceedings of the 2023 Australasian Computer Science Week, 10-17, 2023
202023
Detecting word based dga domains using ensemble models
PVS Charan, SK Shukla, PM Anand
International Conference on Cryptology and Network Security, 127-143, 2020
172020
Dmapt: Study of data mining and machine learning techniques in advanced persistent threat attribution and detection
PVS Charan, PM Anand, SK Shukla
Data Mining-Concepts and Applications, 2021
152021
DOTMUG: a threat model for target specific APT attacks–misusing google teachable machine
PVS Charan, PM Anand, SK Shukla, N Selvan, H Chunduri
2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-8, 2022
132022
A framework for advanced persistent threat attribution using zachman ontology
VSC Putrevu, H Chunduri, MA Putrevu, S Shukla
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference …, 2023
112023
Adapt: Adaptive camouflage based deception orchestration for trapping advanced persistent threats
VSC Putrevu, S Mukhopadhyay, S Manna, N Rani, A Vaid, H Chunduri, ...
Digital Threats: Research and Practice 5 (3), 1-35, 2024
82024
Rtr-shield: Early detection of ransomware using registry and trap files
PM Anand, PVS Charan, H Chunduri, SK Shukla
International Conference on Information Security Practice and Experience …, 2023
72023
From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads. arXiv 2023
PVS Charan, H Chunduri, PM Anand, SK Shukla
arXiv preprint arXiv:2305.15336, 0
7
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence
PVS Charan, G Ratnakaram, H Chunduri, PM Anand, SK Shukla
Computers & Security 132, 103329, 2023
52023
A novel approach for insight finding mechanism on clickstream data using hadoop
PM Anand, GS Vamsi, PR Kumar
2018 Second International Conference on Inventive Communication and …, 2018
52018
A comprehensive analysis of machine learning based file trap selection methods to detect crypto ransomware
MA Putrevu, H Chunduri, VSC Putrevu, SK Shukla
arXiv preprint arXiv:2409.11428, 2024
32024
LARM: Linux Anti Ransomware Monitor
PM Anand, PVS Charan, H Chunduri, SK Shukla
Computers & Security, 104700, 2025
12025
Trusted Yet Disguised: Analysing the Subversive Role of LOLBins in Contemporary Cyber Threats
H Chunduri, PM Anand, SK Shukla, PVS Charan
2024 IEEE International Conference on Big Data (BigData), 2596-2605, 2024
12024
Slap-iot: A secure lightweight authentication protocol for iot device
CHNS Abhishek, C Srinivasan, L KV, PM Anand
inventive communication and computational technologies: Proceedings of …, 2022
12022
Addressing cold start problem in recommendation system using custom built hadoop ecosystem
PVS Charan, PR Kumar, PM Anand
2018 Second International Conference on Inventive Communication and …, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20